A security system includes a surveillance device that monitors a predetermined event and captures images in a monitor scene; and a controller that controls the surveillance device and transmits the captured images. The surveillance device adjusts image capture amount, image transmit amount, image transmit order or image resolution when the predetermined event is detected and an object is detected on the captured images.
|
1. A security system, comprising:
a surveillance device that monitors a predetermined event and captures images in a monitor scene; and
a controller that controls the surveillance device and transmits the captured images;
wherein the surveillance device adjusts image capture amount, image transmit amount, image transmit order or image resolution when the predetermined event is detected and an object is detected on the captured images;
wherein the surveillance device comprises:
a sensor that detects the predetermined event;
a camera that captures an image; and
an edge computing processor that detects an object on only one image captured by the camera;
wherein upon detecting the object by the edge computing processor, the image transmit order is adjusted and the controller accordingly transmits images containing the detected object to a central monitor station or an end user via a network before the controller transmits images not containing the detected object.
3. The system of
a memory that temporarily stores the image captured by the camera.
5. The system of
6. The system of
7. The system of
9. The system of
10. The system of
11. The system of
|
The present invention generally relates to a security system, and more particularly to a surveillance device adaptable to the security system.
A smart home network or home automation system may connect a variety of home electronic systems such as lighting, temperature control, entertainment, security and alarm systems, and may be used to improve quality of life, increase personal productivity, enhance home security and promote convenience of entertainment.
A surveillance device in the smart home network may communicate with a central monitor station (CMS) or an end user via the Internet, thereby resulting in a security system. Images captured by the surveillance device of the smart home network may be transmitted to the CMS or the end user for visual verification.
However, as the data amount of images is generally large, it usually occupies considerable portion of transmission bandwidth and requires large response time and power consumption. The required transmission bandwidth, response time and power consumption can be reduced by transmitting fewer images, however, at the cost of sacrificing the accuracy of visual verification and increasing probability of false alarm.
A need has thus arisen to propose a novel scheme to improve transmission bandwidth, response time and power consumption in the security system.
In view of the foregoing, it is an object of the embodiment of the present invention to provide a security system and method capable of effectively reducing required transmission bandwidth, response time and power consumption by adopting edge computing.
According to one embodiment, a security system includes a surveillance device and a controller. The surveillance device monitors a predetermined event and captures images in a monitor scene. The controller controls the surveillance device and transmits the captured images. The surveillance device adjusts image capture amount, image transmit amount, image transmit order or image resolution when the predetermined event is detected and an object is detected on the captured images.
In the embodiment, the security system 100 may include a surveillance device 11 configured to monitor a predetermined event and to capture images in a monitor scene. In one embodiment, the predetermined event refers to occurrence of motion of an object (e.g., human or animal). In another embodiment, the predetermined event refers to occurrence of an object (e.g., smoke or flame).
The security system 100 may include a controller 12, such as a gateway, configured to control the surveillance device 11 and transmit the captured images to a central monitor station (CMS) 14 or an end user 15 for visual verification via a network 13 (e.g., the Internet). The communication between the controller 12 and the surveillance device 11 may adopt wireless standard such as sub-GHz RF, ZigBee, Bluetooth Low Energy (BLE), Z-Wave or Low Power Wi-Fi; or adopt wired standard such as RS-485.
The surveillance device 11 of the embodiment may include a sensor 111. In the embodiment, the sensor 111 may include a passive sensor. In one example, the sensor 111 may include a passive infrared (PIR) sensor, acting as a motion sensor, configured to detect motion of an object (e.g., human or animal) according to infrared emitted by the object. In another example, the sensor 111 may include a fire sensor, such as smoke sensor or heat sensor, configured to detect object (e.g., smoke or flame) associated with fire.
The surveillance device 11 of the embodiment may include a camera 112 configured to capture the images in the monitor scene, which is then transmitted to the CMS 14 or the end user 15. The surveillance device 11 may include a memory (device) 113 configured to temporality store the captured image.
According to one aspect of the embodiment, the surveillance device 11 may include an edge computing processor 114 configured to process the captured image (of the camera 112) to determine whether the image contains an object (e.g., human, animal, smoke or flame). In the computing field, the term edge computing refers to computation (and data storage) being closer to a source of data but away from a central processor. Take the security system 100 of the embodiment as an example, the edge computing processor 114 (and the memory 113) are closer to the camera 112 (i.e., the source of data) but away from the CMS 14 or the end user 15. Accordingly, required transmission bandwidth, response time and power consumption may be effectively reduced.
If the predetermined event is detected (step 23), the sensor 111 activates the camera 112 to capture an image (step 24). Further, when the predetermined event is detected by the sensor 111, the surveillance device 11 notifies the controller 12, which then notifies the CMS 14 or the end user 15. After the camera 112 obtains captured images, which are then transmitted to the controller 12, the controller 12 subsequently transmits the captured images to the CMS 14 or the end user 15 for visual verification.
In step 25, the edge computing processor 114 receives the captured image (from the camera 112), on which edge computing (e.g., object detection) is performed to determine whether the image contains detected object (e.g., human, animal, smoke or flame) (step 26). Further, the image captured by the camera 112 may be temporarily stored in the memory 113.
If no object is detected on the image (step 26), the flow goes back to step 24 until image capture amount has been reached (step 27). If an object is detected on the image (step 26), the surveillance device 11 adjusts the image capture amount, image transmit amount, image transmit order or image resolution (step 28), and the flow goes back to step 24.
When the capture amount has been reached (step 27), the controller 12 transmits the captured images, via the network 13 (e.g., the Internet), to the CMS 14 or the end user 15 for visual verification according to the image transmit amount or the image resolution (step 29).
In one embodiment, the controller 12 transmits all captured images to the CMS 14 or the end user 15 according to the image transmit amount. In another embodiment, the controller 12 transmits only images with the detected object to the CMS 14 or the end user 15, thereby further reducing required transmission bandwidth, response time and power consumption.
In a further embodiment, if an object is detected on the image (step 26), the image transmit order is then adjusted (step 28) such that the images are transmitted in a particular order instead of being in chronological order. Specifically, in the embodiment, upon detecting the object on the image (step 26), the image containing the detected object is immediately transmitted, before other images are captured or transmitted, to the CMS 14 or the end user 15 for preliminary visual verification. Owing to the adjustment of the image transmit order, the efficiency of visual verification can be substantially enhanced.
In a further embodiment, the controller 12 transmits the captured images, via the network 13 (e.g., the Internet), to the CMS 14 or the end user 15 for visual verification according to the image resolution. In the embodiment, the controller 12 transmits images with detected object with a first (high) resolution image standard, and transmits images without detected object with a second (low) resolution image standard, where the second resolution is lower than the first resolution. For example, the first (high) resolution adopts Video Graphics Array (VGA) image standard, while the second (low) resolution adopts Quarter Video Graphics Array (QVGA) image standard. As QVGA is a quarter the resolution of VGA, more transmission bandwidth, response time and power consumption may be effectively reduced.
Although specific embodiments have been illustrated and described, it will be appreciated by those skilled in the art that various modifications may be made without departing from the scope of the present invention, which is intended to be limited solely by the appended claims.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10750133, | Dec 06 2017 | Honeywell International Inc. | Systems and methods for automatic video recording |
10853949, | Sep 28 2016 | Hitachi Kokusai Electric Inc | Image processing device |
8565228, | Mar 28 2007 | Snap One, LLC | Systems and methods for selecting and ranking video streams |
9818277, | Jul 27 2015 | Amazon Technologies, Inc | Systems and methods for smoke detection |
20070247302, | |||
20160006988, | |||
20190174045, | |||
20200013273, | |||
20200043191, | |||
20210043069, | |||
20210303867, | |||
TW200740209, | |||
TW201635248, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 28 2021 | CHEN, YI-KAI | CLIMAX TECHNOLOGY CO , LTD | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 058531 | /0186 | |
Jan 03 2022 | CLIMAX TECHNOLOGY CO., LTD. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jan 03 2022 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Jan 13 2022 | SMAL: Entity status set to Small. |
Apr 03 2024 | PTGR: Petition Related to Maintenance Fees Granted. |
Date | Maintenance Schedule |
Apr 30 2027 | 4 years fee payment window open |
Oct 30 2027 | 6 months grace period start (w surcharge) |
Apr 30 2028 | patent expiry (for year 4) |
Apr 30 2030 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 30 2031 | 8 years fee payment window open |
Oct 30 2031 | 6 months grace period start (w surcharge) |
Apr 30 2032 | patent expiry (for year 8) |
Apr 30 2034 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 30 2035 | 12 years fee payment window open |
Oct 30 2035 | 6 months grace period start (w surcharge) |
Apr 30 2036 | patent expiry (for year 12) |
Apr 30 2038 | 2 years to revive unintentionally abandoned end. (for year 12) |